Author: Russell Reagan
Date: 18:16:08 05/04/04
Go up one level in this thread
On May 04, 2004 at 19:04:51, Ed Trice wrote: >Does anyone have a concrete example of what position, or family of positions, >this code is encouraging the program to seek or avoid? Here are a few places you can look. Eduard Nemeth's homepage: http://www.beepworld.de/members37/computerschach/index.htm Click on "Anti-Computer" on the menu to the left and it will take you to some German texts (might be interesting on this subject, if the translation is decent, or if you read German). Anyway, he has a PGN file of 20 games he has played against computers where he used the trojan horse attack. Here is a direct link to the PGN: http://www.beepworld.de/memberdateien/members37/computerschach/en.zip Also, search the CCC archives for "mercilous" or "mercilous attack". There was a guy who used to play on ICC under the handle "mercilous" who more or less had his way with just about all of the computers on ICC. I don't remember for sure, but I think this is what prompted Dr. Hyatt to implement the anti-trojan stuff in the first place. You could also try searching the CCC archive for "trojan horse" or "trojan attack" or various things like that and you would probably be able to harvest quite a few games and positions.
This page took 0 seconds to execute
Last modified: Thu, 15 Apr 21 08:11:13 -0700
Current Computer Chess Club Forums at Talkchess. This site by Sean Mintz.